Hello everybody today i will show how to remove readonly error from pendrive and memory card.and how to make pedrive write protected or how to remove write protection from pendrive.there are many uses of this as we can protect our personal data from deleting or accidental format. How to do […]
Category: computer hacking
Full Guide of SQL injection For beginners
SQL Injection is one of the more popular application layer hacking techniques that is used in the wild today. It is a type of input validation attack i.e it occurs when the programmer/developer fails to properly validate the input given by the user. Basically SQL stands for […]